Defending yourself from the internet

1,067 views

Published on

Presentation On 1/21/2011 to a Kendal, a

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,067
On SlideShare
0
From Embeds
0
Number of Embeds
208
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Defending yourself from the internet

  1. 1. Defending Yourself From The InternetPeter Kellner At Kendal<br />
  2. 2. Peter Kellner’s BIO<br /><ul><li>Son Of Eileen Kellner
  3. 3. Brother Of Patty Kellner
  4. 4. Went To Lots Of Schools
  5. 5. Had Lots of Jobs
  6. 6. Made Plenty Of Mistakes
  7. 7. Learned Lots Of Things</li></ul>(Blog at http://peterkellner.net a lot)<br />
  8. 8. The Plan For Tonight <br />Strategies for Using the Internet Safely<br />I Will Talk About 5 Scenarios<br />Get Your Scenarios<br />Open Discussion, Lots of Participation<br />
  9. 9. Two Strategies<br />The Mickey Strategy<br />All Other Options<br />
  10. 10. The Mickey Strategy <br />AKA Sand Strategy<br />Total Aversion<br />
  11. 11. Why Worry?<br />Hacking Started in 1971 With Crackerjack Whistle (2600Mhz)<br />Resulted in 5 Years Probation and the start of a new Era<br />
  12. 12. No Silver Bullets <br />Best we can do is lower our risk (unless use Mickey strategy)<br />Worth the Risk? You decide (I’ve decided Yes)<br />Target Rich Environment. Don’t make yourself a Target!!! (Bike / Dog analogy)<br />
  13. 13. Weapons<br />Knowledge<br />Passwords (examples of good ones)<br />(bad ones)<br />Why? – Computer Very fast at guessing<br />* http://www.grossepointenews.com/Articles-i-2008-03-13-214830.112112_Defend_yourself_on_the_Internet.html<br />
  14. 14. Big Guns / Virus Checking<br />How to Choose (Big ones Only)<br />Norton<br />Symantec<br />WebRoot<br />McAfee<br />More At: http://en.wikipedia.org/wiki/List_of_antivirus_software<br />
  15. 15. Scenarios<br />Social Networks (Twitter and Facebook)<br />Reading Email<br />Browsing the Internet (Not Financial)<br />Buying Things On the Internet<br />Doing Banking<br />Responding to Emails<br />
  16. 16. Social Networks<br />Privacy<br />Sharing<br />Twitter<br />Facebook<br />Spending Money? (probably not)<br />
  17. 17. Email<br />On the Web?<br />Downloading Pictures<br />Keeping your Computer Up to date<br />Post Card Analogy (not letter with envelope)<br />
  18. 18. Browsing The Internet<br />Inputting Passwords (where?)<br />Where Did you Go?<br />Google Incognito Mode (still followed)<br />Cookie Tracking<br />Post Card Analogy<br />
  19. 19. Buying Things On The Internet<br />The LOCK symbol<br />What Computer To Use (only yours)<br />Never From Public Computer (library, café, etc.)<br />Public/Private Key / SSL<br />PayPal Offsite versus on site<br />PCI Compliance / Certifications<br />
  20. 20. Internet Banking<br />Be Very Careful<br />Never give out passwords<br />Use “Special” Password<br />Never from Public Computers<br />Never Respond to Email Warnings<br />Change Your Password Every so Often<br />
  21. 21. Open Discussions<br />Free For All<br />

×